Search icon
Sign in
/
Sign up
EN
English
Русский
Português
ไทย
Türkçe
Українська
Español
हिंदी
中文
Tiếng Việt

Why Do We Collect Logs and Don't Pretend Otherwise?

SEO
Local SEO
Average rating: 44 votes
Author photo
Evgeny Fomenko2024-02-07
Clock icon5 min
Share this article:

Why Do We Collect Logs and Don't Pretend Otherwise?

Many users seeking complete anonymity online turn to anonymizers such as proxy services or VPNs. The idea of using services that claim not to collect user logs, thus ensuring full anonymity, often seems attractive.

In this article, we aim to understand whether users should fear log collection, whether to trust services that claim not to store logs and how this works in iProxy.

What's Contained in Logs

First, let us clarify what information about users is stored in these logs.

Both your internet service provider (ISP) and proxy provider theoretically have access to all your internet traffic. However, logs only refer to high-level information about your internet activity, specifically: from which IP address and port, at what time, and to which internet site the visit occurred, as well as the volume of traffic sent there and back during the connection.

Detailed information, namely "what traffic was transmitted," is not logged. Moreover, accessing such sensitive data, like your messages, passwords, or other authorization data, would constitute criminal activity. Such practices are only undertaken by unscrupulous market players. Accessing traffic content, such as intercepting traffic in combination with HTTPS spoofing, is a direct violation of the law.

Example: If you use iProxy to access YouTube to watch something absolutely perfect, the logs will reflect the following data: proxy data, IP connection to the proxy, date and time, fact of visiting YouTube, and the number of bytes transferred. The logs would NOT contain information about which specific video you watched.

Why Services Collect Logs

So why do services keep user activity logs?

1️⃣ Firstly, it allows them to monitor compliance with service rules and prevent abuses that could harm servers. If services do not control activity and collect logs, users could freely violate rules without consequences.

2️⃣ Secondly, it is about deflecting responsibility. In case of issues with law enforcement agencies, services are interested in identifying the real culprit, rather than taking the blame themselves. This is because the service owners typically rent servers and are responsible for all actions performed from the IP addresses received by them.

It looks something like this: law enforcement agencies approach the service, and inform them that on a certain date, from a certain IP address belonging to this service's server, an unlawful act was committed. They usually need information about who was connected to the VPN server at that time and visited a particular resource.

If the service owner refuses to provide data, they will likely face serious problems from server seizures and website blocks to holding service owners accountable.

Law enforcement agencies can also approach the hosting provider renting out the server. Hosting providers also keep their logs and can provide information on request, although it may be less detailed.

Thus, all similar services have valid reasons for storing logs, so many do it, even if they claim otherwise on their websites.

How does it work in iProxy?

iProxy provides its clients with infrastructure for independently creating and configuring their own mobile proxy servers on Android devices. iProxy itself does not engage in creating, generating, selling, or providing mobile proxies.

Our clients interact with the internet through IP addresses provided by mobile operators. These IPs are linked to SIM cards inserted in their mobile devices used to establish connections.

Thus, the IP addresses assigned to our clients are not related to our servers, so we have no reason to "deflect responsibility from ourselves."

So why do we keep logs?

1️⃣ First reason: We strive to ensure a safe and legal internet environment, so as a responsible company, we act in accordance with laws and public interests to prevent the use of our infrastructure for illegal purposes.

2️⃣ Second reason: We strive to protect the interests of our clients who share their proxy accesses.

As previously mentioned, our clients use IP addresses from mobile operators. Therefore, if law enforcement agencies detect any illegal actions performed from such addresses, they will approach the mobile operator and based on the information provided, they will approach the owner of the SIM card. Consequently, all actions performed under that IP will be considered as actions by the SIM card owner.

Since we have the necessary technical capabilities, we store logs of our clients' connections, therefore, on their request, we can provide information about which IP address and at what time their connection was established, what websites were visited by the user. This way, we can help our client prove their integrity.

How do we protect personal data?

We adhere to high standards and principles of personal data protection established by GDPR, UK GDPR, CalOPPA, the Russian Federal Law No. 152-FZ "On Personal Data," etc.

Our approach to data processing includes the following important principles:

  • Limited access: We can disclose personal data only to official authorized bodies after verifying the legitimacy of their request. We will not transfer your data to individuals who do not have legal rights to access it.
  • Minimum information: We can disclose only the minimum necessary details.
  • Data protection: We ensure a high level of data protection.
  • Prohibition on selling data: We categorically prohibit selling our users' personal data.
  • Transparency: We always strive to provide maximum transparency for our users.

Storing logs is important for ensuring safety and legality in the internet environment. We adhere to strict standards in processing and protecting our users' personal data. Our goal is to provide a reliable and safe environment for all who use our services. We strive to comply with the law and do everything possible to prevent illegal use of our infrastructure.

Your privacy and security are always our top priority.

iProxy Online

SEO
Local SEO
Share this article:

Rate this article, if you like it:

Making mobile proxies is very easy

Create an account right now and get a 48-hour trial
or sign up with email

Try for free
Top Posts

    Sign up for our newsletter

    Get front-row industry insights with our monthly newsletter

    Similar articles

    All about .OVPN configs, UDP, HTTP/3, QUIQ support
    What is .OVPN config, UDP, HTTP/3, QUIQ
    How to set up duplication of incoming SMS messages from Android to Telegram bot?
    The bot will duplicate all SMS messages sent from all your phones to one place.
    What is Mbit/s? How is it different from MByte/s?
    The difference between MByte/s and Mbit/s